Description
D-Link D-View Use of Hard-coded Cryptographic Key Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of D-Link D-View. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the TokenUtils class. The issue results from a hard-coded cryptographic key. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-21991.
Published: 2024-05-23
Score: 9.8 Critical
EPSS: 1.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-46532 D-Link D-View Use of Hard-coded Cryptographic Key Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of D-Link D-View. Authentication is not required to exploit this vulnerability. The specific flaw exists within the TokenUtils class. The issue results from a hard-coded cryptographic key. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-21991.
History

Wed, 06 Aug 2025 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink d-view 8
CPEs cpe:2.3:a:dlink:d-view_8:2.0.1.28:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink d-view 8

cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2024-08-01T21:11:11.620Z

Reserved: 2024-05-23T21:28:51.883Z

Link: CVE-2024-5296

cve-icon Vulnrichment

Updated: 2024-08-01T21:11:11.620Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-23T22:15:15.617

Modified: 2025-08-06T14:25:33.860

Link: CVE-2024-5296

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T22:44:46Z

Weaknesses